- How the U.S. Military Buys Location Data from Ordinary Apps
- On the trail of the Dark Avenger: the most dangerous virus writer in the world
- How to Check Your Devices for Stalkerware
- American Phone-Tracking Firm Demo’d Surveillance Powers by Spying on CIA and NSA
- How to make your offline self harder to find online
Cisco’s redesigned New York office is both a showcase of the company’s technology and an example of how it sees the workplace evolving. WSJ takes a tour to l...
Facial-recognition tech is being used more often. Supporters say it is a safe and convenient way to confirm identity. But skeptics say it possesses security ...
You deserve privacy. Here's how to check your phone, laptop, and online accounts to make sure no one's looking over your shoulder.
Keep your personal information personal
«Our goal in this article is to help you condense your attack surface as much as possible.»
The "Off-Facebook Activity" tool lets you see — and somewhat control — what other sites and apps tell Facebook about you
Face recognition technology has been controversial for years. Cops in the UK are drastically increasing the amount they use it.
Governments already use fake data to confuse their enemies. What if they start doing this in the nuclear realm?
When a homeless man attacked a former city official, footage of the onslaught became a rallying cry. Then came another video, and another—and the story turned inside out.
Experts have warned that utterly realistic A.I.-generated videos might wreak havoc through deception. What’s happened is troubling in a different way.
When the copyright for George Orwell's work expired, two writers reimagined his towering masterpieces, 1984 and Animal Farm. Dorian Lynskey finds out why.
Learn how Apple and Meta use psychology and UX to collect your data while creating an illusion of privacy.
A guide on anonymizing your phone, so you can use it without it using you
Read our simple rules for managing your digital privacy, and get a list of personalized recommendations.
Bad news: your car is a spy. Every major car brand failed a recent privacy and security test from Mozilla. You’re probably driving around in a "privacy nightmare" that may collect information as…
Have you ever wondered how much of your personal information is available online? Here's your chance to find out.
The long read: Bulgaria in the 1980s became known as the ‘virus factory’, where hundreds of malicious computer programs were unleashed to wreak havoc. But who was writing them, and why?
A Muslim prayer app with over 98 million downloads is one of the apps connected to a wide-ranging supply chain that sends ordinary people's personal data to brokers, contractors, and the military.
Anomaly Six, a secretive government contractor, claims to monitor the movements of billions of phones around the world and unmask spies with the press of a button.
«track the movements of billions of people via their phones with a constant stream of data purchased directly from Twitter.»
To replace the cookie in Chrome and Android, Google has an offering for the world called “Privacy Sandbox." Here's an exclusive peek into how it will work.
Signal recently killed SMS support as part of that mission.
Complex systems, wicked problems. Society, technology, science and more. @Columbia professor. @NYTimes columnist. My newsletter @insight http://www.theinsight.org
Host of the Risky Business® podcast. Guests by invitation only. Bsky: http://patrick.risky.biz
Founder & CEO of DuckDuckGo. Co-author of the books Super Thinking & Traction. Tweets auto-delete via TweetDelete. DMs open.
We work to ensure the internet remains a public resource that is open and accessible to all. The nonprofit behind @Firefox. #BlackLivesMatter
Independent investigative journalist. Author of 'Spam Nation,' a NYT bestseller. Former Washington Post reporter. Mastodon: http://infosec.exchange/@briankrebs
How does Refind curate?
It’s a mix of human and algorithmic curation, following a number of steps:
- We monitor 10k+ sources and 1k+ thought leaders on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
- In addition, our users save links from around the web using our Save buttons and our extensions.
- Our algorithm processes 100k+ new links every day and uses external signals to find the most relevant ones, focusing on timeless pieces.
- Our community of active users gets the most relevant links every day, tailored to their interests. They provide feedback via implicit and explicit signals: open, read, listen, share, mark as read, read later, «More/less like this», etc.
- Our algorithm uses these internal signals to refine the selection.
- In addition, we have expert curators who manually curate niche topics.
The result: lists of the best and most useful articles on hundreds of topics.
How does Refind detect «timeless» pieces?
We focus on pieces with long shelf-lives—not news. We determine «timelessness» via a number of metrics, for example, the consumption pattern of links over time.
How many sources does Refind monitor?
We monitor 10k+ content sources on hundreds of topics—publications, blogs, news sites, newsletters, Substack, Medium, Twitter, etc.
Who are the thought leaders in Privacy?
We follow dozens of thought leaders in Privacy, including zeynep tufekci, Patrick Gray, Gabriel Weinberg, Mozilla, briankrebs.
Missing a thought leader? Submit them here
Can I submit a link?
Indirectly, by using Refind and saving links from outside (e.g., via our extensions).
How can I report a problem?
When you’re logged-in, you can flag any link via the «More» (...) menu. You can also report problems via email to email@example.com
Who uses Refind?
400k+ smart people start their day with Refind. To learn something new. To get inspired. To move forward. Our apps have a 4.9/5 rating.
Is Refind free?
Yes, it’s free!
How can I sign up?
Head over to our homepage and sign up by email or with your Twitter or Google account.